Rev 2 | Rev 8 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 2 | Rev 6 | ||
---|---|---|---|
1 | Source: lsh |
1 | Source: lsh |
2 | Section: net |
2 | Section: net |
3 | Priority: extra |
3 | Priority: extra |
4 | Maintainer: Simon Law <sfllaw@debian.org> |
4 | Maintainer: Simon Law <sfllaw@debian.org> |
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de>, |
5 | Uploaders: Stefan Pfetzing <dreamind@dreamind.de>, |
6 | Magnus Holmgren <magnus@kibibyte.se> |
6 | Magnus Holmgren <magnus@kibibyte.se> |
7 | Standards-Version: 3.7.2 |
7 | Standards-Version: 3.7.2 |
8 | Build-Depends: cdbs, debhelper (>= 4.1.16), libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4, autotools-dev |
8 | Build-Depends: cdbs, debhelper (>= 4.1.16), libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev, libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4, autotools-dev |
9 | 9 | ||
10 | Package: lsh-utils |
10 | Package: lsh-utils |
11 | Architecture: any |
11 | Architecture: any |
12 | Depends: lsh-client, ${shlibs:Depends} |
12 | Depends: lsh-client, ${shlibs:Depends} |
13 | Recommends: lsh-server |
13 | Recommends: lsh-server |
14 | Suggests: lsh-utils-doc |
14 | Suggests: lsh-doc |
15 | Conflicts: nettle-bin (<< 1.12-1), |
15 | Conflicts: nettle-bin (<< 1.12-1), |
16 | Description: Secure Shell v2 (SSH2) protocol utilities |
16 | Description: Secure Shell v2 (SSH2) protocol utilities |
17 | lsh is GNU GPL'd implementation of the Secure Shell |
17 | lsh is GNU GPL'd implementation of the Secure Shell |
18 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
18 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
19 | is a secure replacement for rlogin, rsh and rcp. |
19 | is a secure replacement for rlogin, rsh and rcp. |
20 | . |
20 | . |
21 | This package contains the lsh utilities. This includes |
21 | This package contains the lsh utilities. This includes |
22 | programs such as lsh-keygen, lsh-writekey (both programs |
22 | programs such as lsh-keygen, lsh-writekey (both programs |
23 | for public/private key generation), lsh-authorize (for |
23 | for public/private key generation), lsh-authorize (for |
24 | automatic remote key authentication), sexp-conv and ssh-conv |
24 | automatic remote key authentication), sexp-conv and ssh-conv |
25 | (utilities for converting between various public & private |
25 | (utilities for converting between various public & private |
26 | key formats), and a number of other utilities for use with |
26 | key formats), and a number of other utilities for use with |
27 | both the lsh server and client. |
27 | both the lsh server and client. |
28 | . |
28 | . |
29 | In some countries it may be illegal to use any encryption |
29 | In some countries it may be illegal to use any encryption |
30 | at all without a special permit. |
30 | at all without a special permit. |
31 | 31 | ||
32 | Package: lsh-server |
32 | Package: lsh-server |
33 | Architecture: any |
33 | Architecture: any |
34 | Provides: ssh-server |
34 | Provides: ssh-server |
35 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0 |
35 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0 |
36 | Conflicts: lsh-utils (<< 1.0.2-3) |
36 | Conflicts: lsh-utils (<< 1.0.2-3) |
37 | Suggests: lsh-client | openssh-client |
37 | Suggests: lsh-client | openssh-client |
38 | Description: Secure Shell v2 (SSH2) protocol server |
38 | Description: Secure Shell v2 (SSH2) protocol server |
39 | lsh is GNU GPL'd implementation of the Secure Shell |
39 | lsh is GNU GPL'd implementation of the Secure Shell |
40 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
40 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
41 | is a secure replacement for rlogin, rsh and rcp. |
41 | is a secure replacement for rlogin, rsh and rcp. |
42 | . |
42 | . |
43 | This package contains the lsh server, lshd. This package is required |
43 | This package contains the lsh server, lshd. This package is required |
44 | to allow SSH2 logins to the local machine. |
44 | to allow SSH2 logins to the local machine. |
45 | . |
45 | . |
46 | In some countries it may be illegal to use any encryption |
46 | In some countries it may be illegal to use any encryption |
47 | at all without a special permit. |
47 | at all without a special permit. |
48 | 48 | ||
49 | Package: lsh-client |
49 | Package: lsh-client |
50 | Architecture: any |
50 | Architecture: any |
51 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends} |
51 | Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends} |
52 | Conflicts: lsh-utils (<< 1.0.2-3) |
52 | Conflicts: lsh-utils (<< 1.0.2-3) |
53 | Description: Secure Shell v2 (SSH2) protocol client |
53 | Description: Secure Shell v2 (SSH2) protocol client |
54 | lsh is GNU GPL'd implementation of the Secure Shell |
54 | lsh is GNU GPL'd implementation of the Secure Shell |
55 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
55 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
56 | is a secure replacement for rlogin, rsh and rcp. |
56 | is a secure replacement for rlogin, rsh and rcp. |
57 | . |
57 | . |
58 | This package contains the lsh client. This package is |
58 | This package contains the lsh client. This package is |
59 | required to log into a remote lsh or ssh2 server. Please |
59 | required to log into a remote lsh or ssh2 server. Please |
60 | note that the client binary is normally called 'lsh' rather |
60 | note that the client binary is normally called 'lsh' rather |
61 | than 'lshc', but as there is already a 'lsh' binary in |
61 | than 'lshc', but as there is already a 'lsh' binary in |
62 | Debian (the Limited SHell - see the 'lsh' package), the |
62 | Debian (the Limited SHell - see the 'lsh' package), the |
63 | client binary has been renamed to 'lshc'. All the other |
63 | client binary has been renamed to 'lshc'. All the other |
64 | program names remain as normal. |
64 | program names remain as normal. |
65 | . |
65 | . |
66 | In some countries it may be illegal to use any encryption |
66 | In some countries it may be illegal to use any encryption |
67 | at all without a special permit. |
67 | at all without a special permit. |
68 | 68 | ||
69 | Package: lsh-doc |
69 | Package: lsh-doc |
70 | Architecture: all |
70 | Architecture: all |
71 | Section: doc |
71 | Section: doc |
72 | Suggests: lsh-utils, lsh-server, lsh-client |
72 | Suggests: lsh-utils, lsh-server, lsh-client |
- | 73 | Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.3-1) |
|
73 | Conflicts: lsh-utils (<< 1.0.2-3) |
74 | Replaces: lsh-utils-doc (<< 2.0.3-1) |
74 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
75 | Description: Secure Shell v2 (SSH2) client / server / utilities documentation |
75 | lsh is GNU GPL'd implementation of the Secure Shell |
76 | lsh is GNU GPL'd implementation of the Secure Shell |
76 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
77 | protocol version 2 (SSH2). The SSH (Secure SHell) protocol |
77 | is a secure replacement for rlogin, rsh and rcp. |
78 | is a secure replacement for rlogin, rsh and rcp. |
78 | . |
79 | . |
79 | This package contains the lsh documentation, including info |
80 | This package contains the lsh documentation, including info |
80 | pages, manpages about the various protocols which lsh uses, |
81 | pages, manpages about the various protocols which lsh uses, |
81 | as well as various documents about lsh internals, protocols |
82 | as well as various documents about lsh internals, protocols |
82 | and general lsh development. |
83 | and general lsh development. |
83 | . |
84 | . |
84 | In some countries it may be illegal to use any encryption |
85 | In some countries it may be illegal to use any encryption |
85 | at all without a special permit. |
86 | at all without a special permit. |
86 | 87 |